Bring Your Own Key (BYOK)

Bring Your Own Key (BYOK) allows users of cloud services to generate, manage, and provide their own cryptographic keys. BYOK offers end-users significant control over their encryption keys, unlike the model where encryption keys are solely generated and managed by the cloud service provider (CSP). This control enables users to avoid potential issues related to key management and access when switching between providers.

With BYOK, users can securely transfer their encryption keys to their CSP, ensuring the protection of their data across various cloud environments, including multi-cloud deployments. This approach enhances data security and governance by allowing organizations to apply their own encryption policies while utilizing cloud resources.

BYOK enables organizations migrating to the cloud to achieve:

  • Flexibility, convenience, and cost-effectiveness.
  • Strong control of sensitive data and applications.
  • Full visibility over the use of your keys in the cloud.
  • Highest level of data security, integrity, and trust.

BYOK at Piwik PRO

At Piwik PRO, we see great value in implementing Bring Your Own Key (BYOK), which enables customers to enhance the security of their data.

Piwik PRO has long offered BYOK in the private cloud (dedicated hardware). In the standard setup, private cloud instances are hosted on Piwik PRO’s Azure and/or Orange FE account. Piwik PRO retains a billing relationship with cloud providers.

In 2024, we also decided to implement BYOK for the private cloud (dedicated database), which is available with Orange. In that case, the database is set for each client and encrypted with the client’s key.

Additional reading:


  • Introducing Piwik PRO app for Shopify: Advanced analytics with built-in CDP

    We’re excited to introduce the Piwik PRO app for Shopify. This powerful analytics solution helps you understand your customers, optimize campaigns, and make better business decisions with accurate, unsampled data. Get up and running in minutes and start tracking the full customer journey across devices and sessions. With a built-in Customer Data Platform (CDP) included…

  • PHI and PII

    PHI and PII: How they impact HIPAA compliance and your marketing strategy

    Personally identifiable information (PII) and protected health information (PHI) may seem similar. However, there are critical distinctions between the two. While PII is a catch-all term for any information that can be associated with an individual, PHI applies specifically to HIPAA-covered entities dealing with identifiable patient information. Keeping HIPAA compliant and protecting patient information requires…